Posts

Last September, we announced new capabilities in Office 365 Message Encryption that enable users to seamlessly collaborate on protected emails with anyone. This release included Do Not Forward an out-of-the-box policy that encrypts emails and Office attachments, and restricts the content and email from being forwarded, printed or copied.

Today, we are happy to share that we are releasing another out-of-the-box policy called encrypt only. With the encrypt-only policy, users can send encrypted email to any recipient, whether they are inside or outside the organization, and the protection follows the lifecycle of the email. That means recipients can copy, print and forward the email, and encryption will not be removed. This new policy provides more flexibility in the type of protection that can be applied to your sensitive emails.

This is valuable for organizations that want persistent encryption, but do not want to add additional restrictions. For example, a doctor looking to protect an email containing sensitive personal information, can apply the encrypt-only policy, and the patient receiving the email can easily consume the protected message regardless of their email provider, and forward that email to another trusted party.

With this new, flexible policy, users and admins can apply different levels of protection to best fit their data protection needs.

Read more to understand what the encrypt-only policy looks like and how to apply the policy.

How the encrypt-only policy works

The encrypt-only policy is an out-of-the box policy that can be used without additional configuration, and as the name suggests, only applies encryption to the email. You can apply the policy through end-user controls in Outlook or through automatic admin managed controls in the Exchange admin center. Users can apply this policy to individual emails through end-user controls in Outlook, and Admins can apply this policy automatically to any email that matches the set criteria through admin-managed controls in the Exchange admin center.

Customers that have enabled the new Office 365 Message Encryption capabilities will see the encrypt-only policy first through Outlook on the web and in the Exchange admin center under mail flow rules. Updates to Outlook for Windows and Outlook for Mac are planned for the coming months.

How to send an email with the encrypt-only policy in Outlook on the web

Users can apply protection with the encrypt-only policy by clicking on the protect button and changing the permissions to just encrypt. While the other options encrypt the message, the encrypt option will apply the encrypt-only policy to the message, therefore enabling recipients to forward, copy and print the message.

Applying this option will offer added flexibility for recipients to share the email with other trusted parties while encryption continues to persist and throughout the lifecycle of the email.

In Outlook on the web, users can click on the protect button to change the permissions of the email. Once a user clicks on protect, the users can click on encrypt, to only encrypt the email.Once the encrypt-only policy is applied, the user will see a notification that encryption has been applied.

How to apply the encrypt-only policy through Exchange mail flow rules

As an administrator, you can apply the encrypt-only policy automatically to emails that meet certain conditions by creating a mail flow rule. When you do this, email affected by the encrypt-only policy is encrypted in transport by Office 365.

For instructions on creating a mail flow rule that employs the encrypt-only policy, see define mail flow rules to encrypt email messages in Office 365.

You as an administrator can create new mail flow rule to automatically apply the encrypt-only policy to emails.

How to read encrypt-only email using Outlook on the web and Outlook mobile

Office 365 recipients can easily read and reply to emails that have been applied with the encrypt-only policy using Outlook on the web and Outlook mobile directly from the client.

Users can read the encrypted message natively directly in Outlook on the web and Outlook mobile.

The inline reading experience for Outlook desktop (Windows and Mac) will be available in the coming months. In the meantime, Office 365 users using Outlook desktop will see the encrypted mail as an html mail with an rpmsg_v2 attachment.

Non-Office 365 users, receive an html mail with an rpmsg_v4 attachment. Once they click Read Message they are redirected to the Office 365 Message Encryption portal where they can reply, forward, print, or take other allowed actions. More information can be found in this article.

Get started!

The new encrypt-only policy rolls out starting today as part of Office 365 Message Encryption.

Office 365 Message Encryption is offered in Office 365 E3 and E5, or as an add-on -you can find the full list of where Office 365 Message Encryption is offered here.

Have you been working with Planner in Microsoft Teams? Starting today, you can access all your plans from Teams within the Planner web app. On the Planner hub, you’ll see plans from Teams included within the Recent plans and All plans sections, as well as their associated team and channel information. You can favorite a plan for easy access and then work on it in Planner or open it up in Teams. Planner apps mobile will see this as an update in the next week or so.

In an effort to shape the next updates on Auto Attendant and Call Queues in Skype for Business Online Phone System, we would like to invite you to take part in customer feedback surveys we have prepared for you.

These surveys are open to all members of Tech Community, and designed to take just a few minutes of your time. Please click on the links below to start a survey in a new window:

Auto Attendants – Customer Satisfaction Survey

Call Queues – Customer Satisfaction Survey

Your time and feedback is much appreciated, and we look forward to hearing from you on your experiences with Auto Attendants and Call Queues in Skype for Business Online!

The General Data protetion Regulation (GDPR), which began as a regulatory requirement, is increasingly seen as a long-term opportunity to establish greater trust with customers and further unlock employee collaboration and productivity in many businesses. The intelligent compliance solutions in Microsoft 365 help you assess and manage your compliance risks and leverage the cloud to identify, classify, protect, and monitor sensitive data residing in hybrid and heterogeneous environments to support GDPR compliance.

In addition to the updates announced today, capabilities in Microsoft 365 help to:

Protect sensitive data in apps and across cloud services.

Support data protection across platforms.

Provide a consistent labeling schema experience (in preview).

We’re also going to expand sensitive data types to include a GDPR template to consolidate sensitive data types into a single template.

These Microsoft 365 updates and capabilities are designed to provide you with an information protection strategy to help with GDPR compliance.

“GDPR is coming. But with Microsoft’s information protection solutions, we will have a more efficient way to handle compliance.”
—Erlend Skuterud, chief information security officer for Yara

Assess and manage compliance risk with Compliance Manager

Because achieving organizational compliance can be very challenging, we suggest organizations periodically perform risk assessments to understand their compliance posture. Compliance Manager is a cross–Microsoft Cloud services solution designed to help organizations meet complex compliance obligations like the GDPR. The Compliance Manager is now generally available for Azure, Dynamics 365, and Office 365 Business and Enterprise customers in public clouds.

“Compliance Manager really adds great additional value for Microsoft Cloud services by providing insights on the relationships between regulation, processes, and technology,” stated IT manager Nick Postma from Abrona, a Dutch healthcare organization that helps clients on their journey to becoming strong and confident members of society through social partnerships.

Perform risk assessments with Compliance Score

Compliance Score—a Compliance Manager feature—enables you to perform ongoing risk assessments on Microsoft Cloud services with a risk-based score reference, giving you visibility into your compliance performance. Each control is assigned a risk weight based on the level of risk involved due to control failure, and as you implement and assess controls, you’ll see your score change. Compliance Score is currently available for Office 365 and will be rolling out to other Microsoft Cloud services soon.

Learn more about the key capabilities and updates for Compliance Manager and Compliance Score at our Tech Community blog.

Protect sensitive data on-premises

Azure Information Protection scanner addresses hybrid and on-premises scenarios by allowing you to configure policies to automatically discover, classify, label, and protect documents in your on-premises repositories such as File servers and on-premises SharePoint servers. The scanner can be configured to periodically scan on-premises repositories based on company policies. Azure Information Protection scanner is now generally available.

Read “Azure Information Protection scanner” to learn more. To deploy the scanner in your own environment, follow instructions in this technical guide.

Protect sensitive data in apps and across cloud services

Since data travels through many locations—across devices, apps, cloud services, and on-premises—it is important to build the protection into the file so this protection persistently stays with the data itself. Azure Information Protection provides persistent data protection by classifying, labeling, and protecting sensitive files and emails.

Microsoft Cloud App Security (MCAS) can read files labeled by Azure Information Protection and set policies based on the file labels. For example, a file labeled as Confidential, with an associated policy of “do not forward or copy,” cannot leave your network via file sharing apps like Box.net or Dropbox. In addition, the service scans and classifies sensitive files in cloud apps and automatically applies AIP labels for protection—including encryption. To learn more about this feature, read “Automatically apply labels to sensitive files in cloud apps” and the related technical documentation.

Support for data protection across platforms

As part of our information protection vision, our goal is to cover all major device platforms. Building on our efforts to support non-Windows platforms, we are now previewing the ability to label and protect sensitive data natively, with no plugins required, in Office applications running on Mac devices. This enables Mac users to easily classify, label, and protect Word, PowerPoint, and Excel documents in a similar manner that you are used to with the Azure Information Protection client on Windows. Considering that a significant amount of sensitive information is in PDF format, as part of our ongoing partnership, we are in the process of working with Adobe to have the same consistent labeling and protection of PDFs available in Adobe Reader.

To learn more about these new information protection capabilities, visit the Enterprise Mobility + Security blog.

Consistent labeling schema experience now in preview

We are previewing a consistent labeling schema that will be used across information protection solutions in Microsoft 365. To start, this means that the same default labels will be used across both Office 365 and Azure Information Protection—eliminating the need to create labels in two different places.

The consistent labeling model also helps ensure that sensitive labels—regardless of where they were created—are recognized and understood across Microsoft 365, including Azure Information Protection, Office 365 Advanced Data Governance, Office 365 Data Loss Prevention, and Microsoft Cloud App Security. Learn more about the preview of the consistent labeling experience.

“Microsoft’s information protection capabilities help you protect and manage your sensitive data throughout its lifecycle—inside and outside the organization,” stated an analyst from KuppingerCole, an international and independent analyst organization headquartered in Europe.

Detect and classify personal data relevant to GDPR

The ability to automatically classify personal data is a critical part of helping you achieve your GDPR goals. Today, we have over 80 out-of-the-box sensitive information types that can be used to detect and classify your data. Soon we will provide a GDPR sensitive information type template to help detect and classify personal data relevant to GDPR.

The upcoming GDPR sensitive information type template will help consolidate our sensitive data types into a single template—as well as add several new personal data types to detect (such as addresses, telephone numbers, and medical information).

To learn more about the current sensitive information types, read “What the sensitive information types look for.” To learn more about how to create and customize your own sensitive information types, read “Create a custom sensitive information type.”

To provide more flexibility over controlling and protecting personal information shared in sensitive emails, we are rolling out the new encrypt-only policy in Office 365 Message Encryption starting today. Read further about this and other updates in our Tech Community blog.

The Microsoft Cloud is uniquely positioned to help you meet your GDPR compliance obligations. Our cloud solution is built for power, scale, and flexibility.

Microsoft 365 brings together Office 365, Windows 10, and Enterprise Mobility + Security—offering a rich set of integrated solutions that help you assess and manage your compliance risk by leveraging Artificial Intelligence (AI) to protect your most important data and streamline your processes with a sophisticated and holistic solution set.

No matter where you are in your GDPR efforts, the Microsoft Cloud and our intelligent compliance solutions in Microsoft 365 can help you on your journey to GDPR compliance. Learn more about how Microsoft can help you prepare for the GDPR and take our free online GDPR assessment.

Each money related expert invests more energy in Excel than they may care to concede. In light of forever and a day of experience, we have gathered the most essential and progressed Excel equations that each world-class budgetary examiner must know.

1. List MATCH

Recipe: =INDEX(C3:E9,MATCH(B13,C3:C9,0),MATCH(B14,C3:E3,0))

This is a propelled contrasting option to the VLOOKUP or HLOOKUP recipes (which a few disadvantages and constraints). File MATCH is an intense mix of Excel equations that will take your budgetary examination and monetary demonstrating to the following level.

List restores the estimation of a cell in a table in light of the segment and line number.

MATCH restores the situation of a cell in succession or section.

Here is a case of the INDEX and MATCH recipes consolidated together. In this illustration, we gaze upward and restore a man’s tallness in light of their name. Since name and tallness are the two factors in the equation, we can change them two!

Progressed Excel Formulas – Index Match

For a well ordered clarification or how to utilize this equation, please observe our free guide on the best way to utilize INDEX MATCH in Excel.

2. In the event that joined with AND/OR

Recipe: =IF(AND(C2>=C4,C2<=C5),C6,C7)

Any individual who’s invested a lot of energy in different kinds of budgetary models realizes that settled IF equations can be a bad dream. Joining IF with the AND or the OR capacity can be an extraordinary method to keep or recipes less demanding to review and for different clients to get it. In the case beneath, you will perceive how we utilized the individual capacities in mix to make a further developed recipe.

For a definite breakdown of how to play out this capacity in Excel please observe our free guide on the best way to utilize IF with AND/OR.Advanced Excel Formulas – IF AND

The OFFSET work without anyone else isn’t especially best in class, yet when we consolidate it with different capacities like SUM or AVERAGE we can make a really refined recipe. Assume you need to make a dynamic capacity that can total a variable number of cells. With the consistent SUM recipe, you are restricted to a static computation, however by including OFFSET you can have the cell reference move around.

How it functions. To influence this equation to work we substitute completion reference cell of the SUM work with the OFFSET work. This makes the recipe dynamic and cell referenced as E2 is the place you can reveal to Excel what number of back to back cells you need to include. Presently we are very brave Excel recipes!

The following is a screen capture of this marginally more complex recipe in real life.

entirety counterbalance recipe

As you see, the SUM equation begins in cell B4, however it closes with a variable, which is the OFFSET recipe beginning at B4 and proceeding by the incentive in E2 (“3”) less one. This moves the finish of the aggregate recipe more than 2 cells, summing 3 years of information (counting the beginning stage). As should be obvious in cell F7, the aggregate of cells B4:D4 is 15 which is the thing that the balance and total equation gives us.

Figure out how to construct this equation well ordered in our progressed Excel course.

4. Pick Recipe: =CHOOSE(choice, option1, option2, option3)

The CHOOSE work is incredible for situation investigation in money related displaying. It enables you to pick between a particular number of choices, and restore the “decision” that you’ve chosen. For instance, envision you have three unique suspicions for income development one year from now: 5%, 12% and 18%. Utilizing the CHOOSE equation you can return 12% on the off chance that you disclose to Excel you need decision #2.

In case you’re an examiner working in speculation keeping money, value inquire about, or budgetary arranging and investigation (FP&A), or some other territory of corporate fund that requires marking down money streams then these equations are a lifeline!

Basically, XNPV and XIRR enable you to apply particular dates to every individual income that is being marked down. The issue with Excel’s fundamental NPV and IRR equations is that they accept the eras between income are equivalent. Routinely, as an investigator, you’ll have circumstances where money streams are not planned equally, and this recipe is the means by which you settle that.

XNPV propelled fund recipe in Excel

For a more nitty gritty breakdown, see our free IRR versus XIRR recipes control and in addition our XNPV direct.

6. SUMIF and COUNTIF

Recipe: =COUNTIF(D5:D12,”>=21″)

These two propelled recipes are awesome employments of restrictive capacities. SUMIF includes all cells that meet certain criteria, and COUNTIF checks all cells that meet certain criteria. For instance, envision you need to check all cells that are more noteworthy than or equivalent to 21 (the lawful savoring age the U.S.) to discover what number of containers of champagne you requirement for a customer occasion. You can utilize COUNTIF as a propelled arrangement, as appeared in the screen capture underneath.

COUNTIF equation

In our progressed Excel course we separate these equations in much more detail.

On the off chance that you work in business saving money, land, FP&A or any monetary investigator position that arrangements with obligation plans, you’ll need to comprehend these two point by point equations.

The PMT equation gives you the estimation of equivalent installments over the life of an advance. You can utilize it in conjunction with IPMT (which discloses to you the intrigue installments for a similar sort of credit) at that point isolate chief and intrigue installments.

Here is a case of how to utilize the PMT capacity to get the month to month contract installment for a $1 million home loan at 5% for a long time.

PMT Excel equation case

8. LEN and TRIM

Equations: =LEN(text) and =TRIM(text)

These are somewhat less normal, yet surely exceptionally advanced recipes. These applications are incredible for money related examiners that need to compose and control a lot of information. Sadly, the information we get isn’t generally splendidly sorted out and now and then there can be issues like additional spaces toward the start or end of cells

In the case beneath, you can perceive how the TRIM equation tidies up the Excel information.

Progressed Excel – TRIM

9. Link

Equation: =A1&” more content”

Link isn’t generally a capacity all alone, it’s only a creative method for joining data from various cells, and making worksheets more powerful. This is an effective instrument for budgetary examiners performing money related demonstrating (see our free monetary displaying manual for take in more).

In the case beneath, you can perceive how the content “New York” in addition to “, ” is joined with “NY” to make “New York, NY”. This enables you to make dynamic headers and names in worksheets. Presently, rather than refreshing cell B8 straightforwardly, you can refresh cells B2 and D2 autonomously. With an expansive dataset this is an important ability to have available to you.

These progressed Excel capacities can be consolidated to make some extremely progressed and complex recipes to utilize. The CELL capacity can restore an assortment of data about the substance of a cell (its name, area, line, segment, and that’s just the beginning). The LEFT capacity can return content from the earliest starting point of a cell (left to right), MID returns content from any begin purpose of the cell (left to right), and RIGHT returns content from the finish of the cell (ideal to left).

The following is a delineation of these three recipes in real life.

To perceive how these can be joined capably with the CELL work, we separate it for you well ordered in our

In terms of cybersecurity, 2017 was a tough year for financial services firms. According to PWC, financial services firms on average experienced a 130% increase in fraud incidents overall, and failures to protect company and customer data led to legislative action in more than 40 states. Many financial services firms are working as fast as they can to close the gaps, but piecing together the right security solutions to protect everything from core infrastructure to tablets in bank branches can be a difficult task. Even best-of-breed approaches can still leave gaps, often because they may not work so well together with other in-house applications, or because they don’t enable security administrators to see everything that’s happening across the environment.

This is where the integrated platform known as Microsoft 365 can make a real difference because it enables organizations to track user activity throughout their cloud services and analyze audit logs to investigate or remediate possible breaches. Microsoft 365 captures user activities such as viewing, downloading, or sharing documents; changing document or account settings; and resetting passwords. These activities are logged across Exchange Online, SharePoint Online, OneDrive for Business, Yammer, Power BI, Azure Active Directory, and more. At the most basic level, audit logs help you view trends to spot ongoing issues and determine whether there is cause for concern. For example, you can see whether a user has multiple failed login attempts and from what devices, or whether a user has downloaded files containing sensitive company information. This information can determine whether the activity is suspicious or a result of user error (e.g., lost passwords, lack of training).

Microsoft 365 can help financial services institutions manage fraud and breach incidents by enabling you to:

Track financial advisors on the road – where they are, what device(s) they’re using, and when they’ve logged into the system or attempted to access files on the corporate network from a remote location.

Monitor access for private or sensitive financial documents. Access and sharing can be set at the group or user level, which can help prevent employees from having broader access to sensitive client or institutional information. You can also see when someone attempts to access documents without the appropriate permissions.

To learn how audit logs are helping organizations detect, monitor, and remediate emergent threats like illicit consent grants, click here to read this official blog post from the Office 365 Security team on ‘Defending Against Illicit Consent Grants’.

In the event that you have logged various issues in our space, you may locate the accompanying tip accommodating. You can utilize macros to make canned or standard posts on Tech Community, making it that simply that tad speedier to send us your criticism.

To set up a macro for boilerplate text:

Sign in to the Office International community

On the top right go to My Settings complete profile

Go to the Macros tab

Enter a name in the Macro Title field e.g. Office International Feedback

In the Macro box, enter your boilerplate text. You can use HTML tags. If you use the boilerplate text below (or something similar), it will help us manage and investigate your issue quickly:

Whether you’re planning your next dinner date or an upcoming meeting with teammates, the Outlook app is there to help you manage and make the most of your day. Today, we are adding several of your most highly requested calendaring features, including the ability to sync your shared calendars to your phone and manage and RSVP to recurring events.

A big part of our prioritization of new features and enhancements comes from the votes and feedback we receive from you on Outlook UserVoice. We thank you all for your feedback and are excited to hear what you think of our new additions!

You will now be able to view and edit shared Office 365 or Outlook.com calendars, just like you can with your own calendars. Better yet, you can also share your own calendars with others and accept sharing invitations easily right from the app.

If you don’t see your shared calendars right now, don’t worry. We are in the process of upgrading existing shared calendars so that they start syncing to Outlook. However, if you just can’t wait and want the new experience immediately, simply re-accept the sharing invitation from Outlook on iOS or Android. Once you do this, your shared calendar will appear. If you cannot find the original calendar sharing invitation, ask the calendar owner to re-share and accept the new invite from Outlook. And voila!

Manage delegate calendars on the go

For those of you who manage someone else’s calendar at work, you’ll now be able to do this from the palm of your hand. Manage your delegates, accept a delegation request, and fully view and edit the delegated calendar all from Outlook on iOS or Android. And when you receive meeting invitations and responses, we will more clearly indicate if they are for your or your manager’s calendar, so you don’t get them confused.

Get your Meetups added directly to your calendar

Following up on our launch of Facebook and Evernote in Outlook on iOS and Android this year, we are releasing support for Meetup—a new Calendar app in Outlook. Meetup brings people together in thousands of cities to do more of what they want to do in life. Now, when you connect your Meetup account to Outlook, you can see your upcoming Meetups directly on your calendar.

Managing your events is even easier

We are bringing the best of what Outlook has to offer on the web and desktop to your phone, so you can make the most of your busy day while on the go.

These updates are available for both iOS and Android:

Create events with daily, weekly, monthly or yearly recurrences.

RSVP to a single occurrence of a recurring event series (e.g. decline one instance without removing the entire series from your calendar).

See your coworkers’ availability when scheduling meetings (available previously on iOS, now available on Android).

These features are now available on iOS, coming soon to Android:

Add a message when responding to a meeting invite (e.g. explain why you are declining a meeting invitation.)

Set an event as private, to keep the details to yourself when sharing your calendar.

And there’s even more to come!

Let us know what you think of our new calendar features! If you have other ideas for what would make the calendar experience even better for you, let us know on UserVoice right from Outlook by going to Settings > Help & Feedback > Suggest a Feature.

Based on your feedback we have simplified access to much of the great content on MyAdvisor by removing the need to sign up and sign-in for access to and download assets.

With MyAdvisor, you can access guidance materials and tools to help you in whichever stage your deployment is in; be it the early planning stages, mid-deployment, or ongoing maintenance, MyAdvisor helps you to ensure your long-term goals. As your deployment advocate, MyAdvisor offers:

Networking Planner: A toolset to help you calculate and organize your network bandwidth needs for Skype for Business and Microsoft Teams

Deployment Guidance: Assets to help you in your Plan, Deliver, and Operate phases of your deployment

Feature Guidance: Further guidance into additional Skype for Business and Teams features

Academy: A training center with videos and a customized plan to bring you up-to-speed with Skype for Business and Microsoft Teams

To make MyAdvisor more assessible to you, our redesigned site to show you the capabilities of MyAdvisor without the added requirement of signing in! Now, without sign-in, you can:

View deployment guidance for help with your deployment(s)

Learn about new feature guidance for your deployment(s)

Download deployment and feature guidance assets

Watch training videos directly via our Academy

View a sample calculation for the Network Planner to help you with your own calculations

Easily store your preferences throughout the entire MyAdvisor site

We will still require you to sign up and sign in for certain activities such as completing your Network planning activities where you will want to come back over time to review and update your planning activities.

With this update, we encourage you to visit MyAdvisor and navigate through each section to take advantage of the benefits of MyAdvisor for your deployment. If you have any suggestions on how we can further improve MyAdvisor, please feel free to submit your suggestions here.

Office 365, the most recent adaptation of Microsoft Office has changed the whole way its clients were utilizing this efficiency suite. It has concocted two distinct forms to suite the need of the two purchasers and organizations. To have the entire access over all the restrictive highlights of this Office 365, one need its paid membership. Be that as it may, you can likewise attempt its free form with restricted highlights. Since its dispatch, Office 365 has increased enormous notoriety because of the accompanying highlights:

It has simplified collaboration by allowing you save your files online and work on them from remote places

Automatic version updates of all the Office applications without paying extra

Single sign-on and sync with Active directory and more

Once purchased, your needs may change and you might require to change your Office 365 plan for business version. The easiest way to do so is by using Switch Plans button. Follow these steps for switching to another plan:

You’re already using Office 365 Enterprise E5, which already has all the functionality available in Office 365

While switching to another plan, there are chances that you cannot see the plan of your choice. This could happen because the availability of the plans depends on the current services of the plan you are using. You can switch to those plans having the same data-related services. So, it is recommended to check Office 365 for business product comparison available on its official website. If you still want some help in accomplishing this task, you can contact Office Setup support team that works 24*7.